US12169828B2 - Systems and methods for obfuscating transactions - Google Patents
Systems and methods for obfuscating transactions Download PDFInfo
- Publication number
- US12169828B2 US12169828B2 US17/001,457 US202017001457A US12169828B2 US 12169828 B2 US12169828 B2 US 12169828B2 US 202017001457 A US202017001457 A US 202017001457A US 12169828 B2 US12169828 B2 US 12169828B2
- Authority
- US
- United States
- Prior art keywords
- transaction
- ledger
- account
- purchase
- purchase characteristics
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
Definitions
- Various embodiments of the present disclosure relate generally to obfuscating transactions from a ledger, and relate particularly to methods and systems for selectively recording a modified or unmodified version of one or more purchase characteristics relating to a transaction.
- a transaction ledger associated with the account or receive notifications of transactions which may reveal an occurrence of the transaction may identify various data associated with the transaction, such as a description of the goods or services or the vendor providing the goods or services, a sale amount for the purchase of the goods or services, or a date and/or time of the transaction.
- Including information associated with the transaction on a ledger or notification may hinder the ability of customers in temporarily concealing an occurrence of the transaction from other joint account holders. For example, a customer seeking to purchase a gift with funds from an account of which the intended recipient of the gift is a joint account holder may wish to delay knowledge of the transaction to the intended recipient prior to the customer offering the gift to the intended recipient.
- the present disclosure is directed to addressing one or more of these above-referenced challenges.
- the background description provided herein is for the purpose of generally presenting the context of the disclosure. Unless otherwise indicated herein, the materials described in this section are not prior art to the claims in this application and are not admitted to be prior art, or suggestions of the prior art, by inclusion in this section.
- a computer-implemented method may include receiving a user command including one or more criteria characteristics in association with an account; detecting an occurrence of a transaction from the account, wherein the transaction is associated with one or more purchase characteristics; determining whether the one or more purchase characteristics of the transaction match the one or more criteria characteristics; recording a modified version of the one or more purchase characteristics of the transaction on a ledger of the account in response to determining the one or more purchase characteristics match the one or more criteria characteristics; and recording an unmodified version of the one or more purchase characteristics of the transaction on the ledger in response to determining the one or more purchase characteristics do not match the one or more criteria characteristics.
- a computer-implemented method may include receiving a user command to modify a transaction associated with an account, wherein the user command includes a defined duration and the transaction includes one or more purchase characteristics; altering the one or more purchase characteristics of the transaction to a modified version for inclusion on a ledger associated with the account; determining whether the defined duration has lapsed; in response to determining the defined duration has lapsed, altering the one or more purchase characteristics of the transaction to an unmodified version for inclusion on the ledger; and in response to determining the defined duration has not lapsed, periodically reassessing whether the defined duration has lapsed at a predetermined interval.
- a system may include a processor, and a memory storing instructions that, when executed by the processor, causes the processor to perform operations including: receiving a user command including one or more criteria characteristics in association with an account; detecting an occurrence of a transaction from the account, wherein the transaction is associated with one or more purchase characteristics; determining whether the one or more purchase characteristics of the transaction match the one or more criteria characteristics; recording a modified version of the one or more purchase characteristics of the transaction on a ledger of the account in response to determining the one or more purchase characteristics match the one or more criteria characteristics; and recording an unmodified version the one or more purchase characteristics of the transaction on the ledger in response to determining the one or more purchase characteristics do not match the one or more criteria characteristics.
- FIG. 1 depicts an exemplary client-server environment that may be utilized according to aspects of the present disclosure.
- FIG. 2 depicts an exemplary process for proactively obfuscating transactions from a ledger.
- FIG. 3 depicts an exemplary process for retroactively obfuscating transactions from a ledger.
- FIG. 4 depicts an example of a computing device, according to aspects of the present disclosure.
- computer system generally encompasses any device or combination of devices, each device having at least one processor that executes instructions from a memory medium. Additionally, a computer system may be included as a part of another computer system.
- the term “based on” means “based at least in part on.”
- the singular forms “a,” “an,” and “the” include plural referents unless the context dictates otherwise.
- the term “exemplary” is used in the sense of “example” rather than “ideal.”
- the term “or” is meant to be inclusive and means either, any, several, or all of the listed items.
- the terms “comprises,” “comprising,” “includes,” “including,” or other variations thereof, are intended to cover a non-exclusive inclusion such that a process, method, or product that comprises a list of elements does not necessarily include only those elements, but may include other elements not expressly listed or inherent to such a process, method, article, or apparatus. Relative terms, such as, “substantially,” “approximately,” “about,” and “generally,” are used to indicate a possible variation of ⁇ 10% of a stated or understood value.
- the term “merchant” may indicate, and may be used interchangeably with, a seller of items or services, a vendor of items or services, etc.
- client may indicate, and may be used interchangeably with, a customer, buyer, purchaser, person attempting to obtain ownership of a good (e.g., item) and/or service.
- the present disclosure provides methods and systems for using machine learning techniques to obfuscate a description of a transaction on a ledger.
- ledger as used herein may refer to a written collection or summary (e.g., electronic or paper) of a financial account for recording and totaling economic transactions that are measured in a monetary unit.
- existing techniques may be improved with the methods and systems of the present disclosure.
- Clients may purchase certain goods or services (collectively referred to below as an “item”) that they seek to give to a recipient who is a fellow (e.g., joint) account holder of the account utilized to acquire the good or service. Accordingly, the client may desire preventing disclosure of the transaction to the recipient until after the item is provided to the recipient. However, as an authorized account holder of the account used to purchase the item, the recipient may review a ledger associated with the account or receive a programmed notification of the transaction prior to the client providing the item to the recipient. Thus, the recipient may acquire knowledge of the transaction before the client has offered the item to the recipient. Such ledgers or notifications may identify various information associated with the transaction, thereby revealing identifying characteristics of the item purchased.
- Documenting information associated with the transaction on a ledger or notification may inhibit the client from surprising the recipient with the item at a time after the purchase. Accordingly, a need exists to provide retroactive capabilities of obfuscating information on a ledger associated with prior transactions. A need also exists to provide proactive capabilities of obfuscating future transactions from a ledger prior to the occurrence of the transaction based on various user-specified criteria.
- FIG. 1 depicts an exemplary client-server environment that may be utilized with techniques presented herein.
- the environment may include a system 100 with one or more user devices 105 , one or more financial institution servers 110 , one or more merchant servers 120 , and one or more payment processors 125 in communication with one another across an electronic network 115 .
- the one or more components of system 100 of FIG. 1 may communicate in any arrangement.
- User device 105 may be associated with a user, such as, for example, a user seeking to obfuscate information relating to a transaction.
- payment processor 125 may be a unitary component with financial institution server 110 .
- the user may be a customer of one or more financial institutions and may have one or more consumer accounts with said financial institution(s).
- the one or more consumer accounts may be stored on (or otherwise associated with) financial institution server 110 and the user may access the consumer accounts via user device 105 , such as, for example, via an electronic application (e.g., a text messaging application, an e-commerce application, a social media application, or the like), an internet browser extension, or a website page.
- the user may conduct one or more transactions with the consumer account(s), such as, for example, purchasing a product, a good, or a service from one or more merchants, retailers, and the like.
- the user may access, review, and/or edit information relating to the one or more transactions conducted with the consumer account(s) via user device 105 .
- a ledger e.g., an account summary, a financial report, an accounting log, a transaction overview, etc.
- the ledger may be in various suitable formats, including, for example, an electronic version, a paper version, and more.
- One or more of user device 105 , financial institution server 110 , merchant server 120 , and/or payment processor 125 may communicate with each other over the electronic network 115 in executing a machine learning model to identify a transaction, determine certain obfuscation rules applicable to the transaction, and execute an obfuscation of information relating to the transaction.
- obfuscating may include various forms of revising, editing, modifying, and/or adjusting one or more details, data, or information relating to a transaction.
- a “machine learning model” may include data (e.g., product data, vendor data, or historical customer data) or instruction(s) for generating, retrieving, and/or analyzing such data.
- electronic network 115 may include a telecommunications network such that one or more of financial institution server 110 , merchant server 120 , and/or payment processor 125 may communicate with user device 105 over the telecommunications network, such as, for example, via a text messaging channel.
- electronic network 115 may be a wide area network (“WAN”), a local area network (“LAN”), personal area network (“PAN”), or the like.
- electronic network 115 includes the Internet, and information and data provided between various components of system 100 may occur online.
- “Online” may mean connecting to or accessing source data or information from a location remote from other devices or networks coupled to the internet.
- “online” may refer to connecting or accessing an electronic network (wired or wireless) via a mobile communications network or device.
- the Internet is a worldwide system of computer networks—a network of networks in which a party at one computer or other device connected to the network can obtain information from any other computer and communicate with parties of other computers or devices.
- the most widely used part of the Internet is the World Wide Web (often-abbreviated “WWW” or called “the Web”).
- electronic network 115 may be a telecommunications network, such as, for example, a telephone network, cellular network, or the like, or combinations thereof.
- a text messaging channel may be embedded into, linked with, or configured to operate in conjunction with an electronic application operating on user device 105 and/or on electronic network 115 .
- FIG. 1 depicts the various components of system 100 as physically separate and communicating across network 115 , it should be appreciated that in other embodiments one or more components of system 100 may be incorporated partially or completely into any of the other components shown in FIG. 1 . Some or all of the functionality of the machine learning model may be incorporated into one or more components of system 100 , such as, for example, payment processor 125 . Some or all of the functionality of payment processor 125 may be accessible via user device 105 and incorporated into a text messaging application, an internet browser extension, or website page.
- FIG. 2 illustrates an exemplary process 200 for proactively obfuscating transactions using the system 100 of the present disclosure.
- the one or more user commands may include criteria characteristics in association with the particular consumer account.
- the criteria characteristics may include criteria characteristics for obfuscating certain transactions.
- the one or more user commands may be received via an input at user device 105 and received by payment processor 125 (and/or financial institution server 110 ) through electronic network 115 .
- the criteria characteristics may include information associated with and/or usable to identify prospective transactions.
- the criteria characteristics may designate certain purchase characteristics of a transaction, including but not limited to, a product (e.g., good, service, etc.) name, a merchant name, a transaction date, a transaction time, a transaction identification number, a transaction amount (e.g., an estimated sale range), a merchant identification number, a merchant category code, a product description, a transaction description, an image, and more.
- a product e.g., good, service, etc.
- a merchant name e.g., a transaction date, a transaction time
- a transaction identification number e.g., a transaction amount (e.g., an estimated sale range)
- a transaction amount e.g., an estimated sale range
- system 100 may be configured to determine whether a transaction conducted by the user with the one or more consumer accounts qualify for obfuscation.
- a user may define a duration in which the obfuscation rules remain active when providing the user command at step 202 (e.g., via user device 105 ).
- the obfuscation rules may remain operable until receiving a further (e.g., second) user command indicative of a manual deactivation of the obfuscation process 200 .
- financial institution server 110 may detect an occurrence of a transaction conducted with a consumer account.
- a transaction may be detected by payment processor 125 in response to receiving transactional data indicative of a purchase made with the consumer account, such as from merchant server 120 .
- the consumer account may be communicatively coupled to a consumer card (e.g., credit card, debit card, etc.), a mobile payment application (e.g., on user device 105 ), and the like. Accordingly, completing a purchase may generate the transactional data thereby indicating an occurrence of the transaction.
- the transactional data may include various information relating to the transaction.
- the transactional data may include one or more purchase characteristics (e.g., data fields) relating to the transaction.
- the one or more purchase characteristics may include, but is not limited to, a product (e.g., good, service, etc.) name, a merchant name, a transaction date, a transaction time, a transaction identification number, a transaction amount, a merchant identification number, a merchant category code, a product description, a transaction description, an image, and more.
- system 100 may be configured to determine whether the obfuscation rules created by the user are applicable to the detected transaction. That is, system 100 may be configured to determine whether the one or more purchase characteristics of the transaction match the one or more criteria characteristics by comparing the one or more purchase characteristics of the transaction with the one or more criteria characteristics defined by the user command.
- the user command may be personalized such that the obfuscation rules are applied to the transaction when at least one of the criteria characteristics defined by the user match at least one of the purchase characteristics.
- the user command may define a minimum threshold requirement for applying the obfuscation rules to a transaction.
- the transaction may be obfuscated when a degree of similarity between the criteria characteristics and the purchase characteristics of the transaction at least equals or exceeds the minimum threshold.
- the minimum threshold may include two or more common characteristics between the criteria characteristics and the purchase characteristics.
- the minimum threshold defined by the user command may require a complete (e.g., 100%) match between the one or more criteria characteristics selected by the user and the one or more purchase characteristics of the transaction.
- system 100 may record an unmodified version of the purchase characteristics onto a ledger at step 214 .
- the ledger may be associated with the consumer account stored on financial institution server 110 and used to conduct the transaction detected at step 204 .
- the transaction details generated by merchant server 120 , and received by payment processor 125 may be maintained in an original format on the ledger of financial institution server 110 without adjusting the one or more purchase characteristics.
- system 100 may record a modified version of the one or more purchase characteristics onto the ledger of financial institution server 110 at step 210 .
- the transaction details generated by merchant server 120 , and received by payment processor 125 may be adjusted relative to an original format of the one or more purchase characteristics.
- a form, extent, and/or type of adjustment of the one or more purchase characteristics may be determined by the obfuscation rules defined by the user command received at step 202 .
- system 100 may be configured to record one or more of a product (e.g., good, service, etc.) name, a merchant name, a transaction date, a transaction time, a transaction identification number, a transaction amount, a merchant identification number, a merchant category code, a product description, a transaction description, an image, and more with an alias that is personalized by the user or generated by system 100 .
- a product e.g., good, service, etc.
- the user may input (e.g., via user device 105 ) an alias identifier for one or more of the purchase characteristics to obfuscate the transaction.
- a modified version of the purchase characteristics is recorded onto the ledger of financial institution server 110 at step 210 .
- the alias identifier may include a personalized text string determined by the user, such as, for example, including a customized merchant name, transaction amount, transaction time or date, and more.
- the alias identifier may include transaction data fetched from a transaction history of the consumer account, such as, for example, from one or more prior transactions recorded on financial institution server 110 and selectively identified by the user.
- the purchase characteristics of the subject transaction detected at step 204 may be replaced with purchase characteristics of the one or more prior transactions identified by the user, such that the subject transaction may resemble at least one prior transaction.
- system 100 may be configured to automatically determine the alias identifier by comparing purchase characteristics of the transaction to other transactions conducted from the consumer account (e.g., on financial institution server 110 ) to identify a substitute transaction for modifying the subject transaction. In this instance, system 100 may replace purchase characteristics of the subject transaction with at least a portion of the purchase characteristics of the substitute transaction to obfuscate the subject transaction detected at step 204 . System 100 may be further configured to generate a list of alias recommendations regarding one or more of the purchase characteristics for selection by the user. The list of alias recommendations generated by system 100 may be determined based on one or more factors, such as, for example, one or more of the purchase characteristics of the transaction.
- a list of alias recommendations for a merchant name may vary based on a transaction amount, a merchant category code, a transaction description, etc. of the subject transaction detected at step 204 .
- the process 200 may include a further step of receiving a user selection from the list of alias recommendations.
- system 100 may include a machine learning algorithm (e.g., on or in communication with financial institution server 110 , payment processor 125 , etc.) that determines applicable merchant category codes based on a transaction amount of the subject transaction.
- the machine learning algorithm may further determine one or more merchants within a predetermined vicinity of the user (e.g., based on a GPS location of user device 105 , a merchant location of the subject transaction received from merchant server 120 , etc.) that correspond to the applicable merchant category codes.
- the list of alias recommendations may include local merchants that may retail goods and/or services for sale at a cost about the transaction amount.
- data relating to the one or more merchants may be received from merchant server 120 and/or stored on payment processor 125 from prior transaction history.
- system 100 may be configured to omit the one or more purchase characteristics from the ledger such that the transaction may be excluded from the ledger entirely.
- system 100 may be configured to visually redact the one or more purchase characteristics from the ledger such that the transaction may be included on the ledger and details of the transaction may be obfuscated. In this instance, an occurrence of the transaction may be identified upon a visual inspection of the ledger but at least one or more of the purchase characteristics of the transaction may be unidentifiable.
- process 200 may include an optional step of determining whether the account is preprogrammed to transmit a push notification associated with the transaction (e.g., to display the purchase characteristics) upon detecting occurrence of the transaction.
- System 100 may be configured to modify the notification transmitted by payment processor 125 to user device 105 (e.g., and user device(s) 105 of any one or more joint account holders) in accordance with the obfuscation rules.
- a setup and/or setting of the consumer account stored on financial institution sever 110 may be programmed to transmit a notification (e.g., an alert transmitted to user device 105 via an SMS message, an audible message, electronic mail, etc.) to the user regarding occurrence of the transaction.
- the notification may include information relating to the transaction, such as the one or more purchase characteristics.
- the modified version of the purchase characteristics recorded on the ledger at step 210 may be included in the notification in lieu of the original, unmodified version of purchase characteristics.
- the ledger and notification may maintain similar information regarding the subject transaction detected at step 204 .
- system 100 may be configured to modify a balance of the ledger based on one or more user commands received from user device 105 at step 202 .
- the balance of the ledger may be modified to exclude the transaction amount of the obfuscated transaction, while in other examples the transaction amount may be included in the total balance due despite one or more purchase characteristics of the transaction being at least partially modified.
- the total balance of the ledger may include the original, unmodified transaction amount when the individualized, modified transaction amount is displayed on the ledger.
- the total balance of the ledger may include the original, unmodified transaction amount when a transaction is omitted entirely from the ledger.
- the obfuscation rules defined by the one or more user commands may further include a duration (e.g., user-defined duration) for implementing obfuscation of the one or more transaction(s) in accordance with the criteria characteristics.
- the duration may specify various periods for actively maintaining the criteria characteristics in-force including, but not limited to, one (1) minute, one (1) hour, one (1) day, one (1) week, one (1) month, one (1) year, etc. It should be appreciated that various other suitable durations may be employed by system 100 other than those described herein without departing from the scope of this disclosure. Accordingly, the obfuscation process 200 may automatically terminate upon expiration of the duration.
- system 100 may be configured to monitor the duration that the obfuscation rules are applied to a particular transaction. Stated differently, system 100 may determine a duration lapse for recording the modified version of the purchase characteristics on the ledger. System 100 may determine whether the defined duration has lapsed at step 212 and, in response to determining the defined duration has not lapsed (e.g., step 212 : NO), maintain the modified purchase characteristics on the ledger. Alternatively, in response to determining the defined duration has lapsed at step 212 (e.g., step 212 : YES), system 100 may be configured to remove the modified version of the purchase characteristics from the ledger and record an unmodified version of the purchase characteristics at step 214 . In this instance, the original purchase characteristics of the transaction detected at step 204 may be populated onto the ledger so as to replace the modified purchase characteristics recorded thereon during the defined duration.
- the obfuscation rules defined by the one or more user commands at step 202 may include a defined release date in lieu of the defined duration described above.
- system 100 may periodically determine whether a current date equals the defined release date prior to updating the ledger with the unmodified version of the purchase characteristics.
- the user command received by user device 105 may define the obfuscation rules indefinitely such that step 212 of process 200 may be omitted entirely.
- System 100 may be configured to provide a periodic notification to the user (e.g., via user device 105 ) with a message alerting the user to the continued implementation of the obfuscation rules associated with the consumer account on financial institution server 110 .
- system 100 may be configured to generate a report that includes a list of one or more transactions that may have been at least partially obfuscated during the defined duration.
- the report may further include the unmodified version of the purchase characteristics for each of the one or more transactions listed in the report.
- the report may be made accessible for review through user device 105 (e.g., via an electronic application, an internet browser extension, or a website page).
- a notification may be generated and transmitted to user device 105 indicating existence of the report and identifying the one or more transactions that were previously obfuscated.
- a hardcopy of the report may be printed and included as an appendix to a monthly ledger mailed to the user in paper format.
- a report and/or notification may be generated and transmitted to the third-party for accurate record-keeping purposes.
- the updated ledger of the consumer account may include one or more notations (e.g., a symbol, an asterisk, a highlight, an annotation, etc.) to indicate a transaction that has been updated relative to a modified version.
- system 100 may be configured to automatically implement the exemplary process 200 shown and described above based on one or more predefined parameters.
- the one or more predefined parameters may include purchase characteristics of a transaction received by payment processor 125 from merchant server 120 .
- the one or more predefined parameters may include, but is not limited to, a current date (e.g., a birthday, an anniversary, a holiday, etc.), a merchant name (e.g., a particular retailer), a merchant category code (e.g., florist, jewelry, bakery, etc.), and more.
- the obfuscation rules e.g., criteria characteristics, predefined duration, etc.
- the exemplary process 200 may be implemented by the user for a consumer account of a second user when the user shares access to the consumer account of the second user (e.g., when the user and the second user are joint account holders of the consumer account).
- the user may utilize system 100 to obfuscate one or more transactions conducted on the consumer account by the user and/or by the second user.
- a functional capability of system 100 in accordance with the exemplary process 200 shown and described above, may be selectively disabled by the user.
- the user may disable implementation of the exemplary process 200 for transactions having one or more predefined purchase characteristics (e.g., a merchant name, a transaction amount, a merchant category code, etc.), such as, for example, transactions involving the purchase of alcohol, gambling, medical prescriptions, and more.
- the user may restrict the functionality of the exemplary process 200 to retail transactions to inhibit obfuscation of transactions relating to business dealings.
- FIG. 3 illustrates an exemplary process 300 for retroactively obfuscating transactions using system 100 of the present disclosure.
- the user command may include an input of one or more criteria characteristics for identifying the particular transaction(s) in the consumer account for obfuscation.
- the user commands may be inputted via user device 105 and received by payment processor 125 (and/or financial institution server 110 ) through electronic network 115 .
- the one or more user commands may further include a format instruction, and process 200 may optionally include, at step 304 , determining a format of obfuscation from the user command received at step 302 .
- the format instruction may define one or more types of obfuscation, including but not limited to, a redaction, a modification (e.g., user-defined, computer-generated, etc.), an omission, and more.
- the format instruction may be directed toward certain purchase characteristics of a transaction, including but not limited to, a product (e.g., good, service, etc.) name, a merchant name, a transaction date, a transaction time, a transaction identification number, a transaction amount (e.g., an estimated sale range), a merchant identification number, a merchant category code, a product description, a transaction description, an image, and more.
- the format instruction may define a type of obfuscation to perform for a particular purchase characteristics.
- the user command at step 302 may include similar and/or different format instructions for each of the one or more purchase characteristics of a transaction.
- system 100 may alter one or more purchase characteristics of the transaction to a modified version for inclusion on a ledger associated with the account.
- the modified version of the one or more purchase characteristics may be altered relative to an original version of the purchase characteristics and may be displayed on the ledger for a defined duration.
- the defined duration may specify various periods for actively maintaining obfuscation of the transaction selected at step 302 .
- System 100 may determine whether the defined duration has lapsed at step 308 and, in response to determining the defined duration has not lapsed (e.g., step 308 : NO), maintain the modified purchase characteristics on the ledger.
- system 100 may be configured to wait a predetermined interval prior to returning to step 308 to determine whether the defined duration has lapsed.
- the predetermined interval may include a duration ranging from about one (1) minute, one (1) hour, one (1) day, one (1) week, one (1) month, etc.
- system 100 may be configured to remove the modified version of the purchase characteristics from the ledger and record an unmodified version of the purchase characteristics at step 312 .
- the original purchase characteristics of the transaction initially recorded on the ledger prior to receiving the user command at step 302 may be returned onto the ledger so as to replace the modified purchase characteristics recorded thereon during the defined duration.
- system 100 may be configured to generate a report that includes a list of the obfuscated transaction(s) and/or the unmodified version of the purchase characteristics the obfuscated transaction(s).
- a notification may be transmitted to user device 105 alerting the user to the report and/or identifying the obfuscated transaction(s).
- system 100 may be configured to automatically implement the exemplary process 300 shown and described above upon receiving the user command at step 302 .
- the transaction identified at step 302 from financial institution server 110 may be at various processing stages, such as, for example, an initial authorization stage, a pending stage, a posted stage, and a paid stage.
- the user command at step 302 may be received prior to occurrence of the transaction such that system 100 determines the applicable transaction for obfuscation when detecting an occurrence of a transaction within a predetermined period (e.g., one second, one minute, one hour, one day, etc.) after receiving the user command.
- a predetermined period e.g., one second, one minute, one hour, one day, etc.
- the user may activate process 300 by actuating a trigger (e.g., a button, an icon, a dial, etc.) via user device 105 indicating application of the obfuscation process to any ensuing transaction(s) processed by payment processor 125 .
- Payment processor 125 may be configured to implement the obfuscation process 300 for any transaction(s) processed within the predetermined period while simultaneously forgoing obfuscation of detected transactions deemed to be routine.
- routine and/or periodic transactions are coincidentally processed by payment processor 125 during the predetermined period.
- System 100 may be configured to identify and omit obfuscation of said regularly-scheduled transaction(s) occurring during the predetermined period.
- system 100 e.g., payment processor 125 , financial institution server 110 , etc.
- deploys a machine learning model configured to determine one or more routine transactions occurring during the predetermined period. Any acceptable machine learning technique may be used.
- the machine learning model is trained to learn associations between routine transactions from one or more transactions targeted for obfuscation.
- the execution of the machine learning model may include deployment of one or more machine learning techniques, such as linear regression, logistical regression, random forest, gradient boosted machine (GBM), and/or a deep neural network.
- machine learning techniques such as linear regression, logistical regression, random forest, gradient boosted machine (GBM), and/or a deep neural network.
- Supervised or unsupervised training may be employed.
- unsupervised approaches may include K-means clustering.
- K-Nearest Neighbors may also be used, which may be supervised or unsupervised.
- Combinations of K-Nearest Neighbors and an unsupervised cluster technique may also be used.
- a user(s) of system 100 may be required to acknowledge and/or accept a notice generated by system 100 disclaiming the prospective application of the one or more obfuscation rules described herein when agreeing to use system 100 . That is, system 100 may be configured to notify the one or more users of the various obfuscation functionalities shown herein during an initial registration or onboarding process. System 100 may require an affirmative acceptance by the one or more users of such terms and conditions prior to receiving access to the financial institution account(s) associated with system 100 . Accordingly, the user(s) may be required to accept possible obfuscation of an account ledger during use and/or ownership of the account with the financial institution.
- FIG. 4 is a simplified functional block diagram of a computing device 400 that may be configured as a device for executing the methods of FIGS. 2 - 3 , according to exemplary embodiments of the present disclosure.
- Any of the devices, servers, processors, etc. of system 100 discussed herein may be an assembly of the hardware of computing device 400 including, for example, user device 105 , financial institution server 110 , merchant server 120 , and/or payment processor 125 according to exemplary embodiments of the present disclosure.
- Computing device 400 may include a central processing unit (“CPU”) 402 that may be in the form of one or more processors configured to execute program instructions, such as those of processes 200 , 300 described in detail above.
- the processor(s) of CPU 402 includes both a CPU and a GPU.
- Computing device 400 may further include a storage unit 406 that may include non-volatile memory, such as, for example, a storage media (e.g., solid-state drives), ROM, HDD, SDD, etc. Examples of storage media include solid-state storage media (e.g., solid state drives and/or removable flash memory), optical storage media (e.g., optical discs), and/or magnetic storage media (e.g., hard disk drives).
- a storage media e.g., solid state drives and/or removable flash memory
- optical storage media e.g., optical discs
- magnetic storage media e.g., hard disk drives
- Storage unit 406 may store data on a computer readable medium 422 .
- computing device 400 may receive programming and data via network communications from electronic network 115 , such as, for example, via a communication interface 420 configured to communicate with one or more other components of system 100 .
- computing device 400 may include a memory 404 that is volatile memory, such as, for example, RAM, solid-state memories, optical storage media (e.g., optical discs), magnetic storage media (e.g., hard disk drives), etc.
- Memory 404 may be configured for storing one or more instructions 424 for executing techniques presented herein, such as those of processes 200 , 300 shown and described above.
- Memory 404 may further include a non-transitory computer-readable medium.
- this disclosure shall also be understood as describing a non-transitory computer-readable medium storing instructions that, when executed by one or more processors (e.g., CPU 402 ), cause the one or more processors to perform the computer-implemented method.
- processors e.g., CPU 402
- the one or more instructions 424 may be stored temporarily or permanently within other modules of computing device 400 , such as, for example, CPU 402 , computer readable medium 422 , and more.
- Computing device 400 may include an input/output device 412 including one or more input ports and one or more output ports.
- Input/output device 412 may include, for example, a keyboard, a mouse, a touchscreen, etc. (i.e., input ports).
- Input/output device 412 may further include a monitor, a display, a printer, etc. (i.e. output ports).
- Computing device 400 may further include a display device 410 configured to connect with input/output device 412 .
- the aforementioned elements of computing device 400 may be connected to one another through an internal communication bus 408 , which represents one or more busses.
- the various system functions of processes 200 , 300 shown in FIGS. 2 - 3 may be implemented in a distributed fashion on a number of similar platforms to distribute the processing load on multiple computing devices 400 .
- the system functions may be implemented by appropriate programming of one computer hardware platform, such as, for example, computing device 400 .
- Storage type media include any or all of the tangible memory of the computers, processors or the like, or associated modules thereof, such as various semiconductor memories, tape drives, disk drives and the like, which may provide non-transitory storage at any time for the software programming.
- All or portions of the software may at times be communicated through the Internet or various other telecommunication networks. Such communications, for example, may enable loading of the software from one computer or processor into another, for example, from a management server or host computer of the mobile communication network into the computer platform of a server and/or from a server to the mobile device.
- another type of media that may bear the software elements includes optical, electrical and electromagnetic waves, such as used across physical interfaces between local devices, through wired and optical landline networks and over various air-links.
- the physical elements that carry such waves, such as wired or wireless links, optical links, or the like, also may be considered as media bearing the software.
- terms such as computer or machine “readable medium” refer to any medium that participates in providing instructions to a processor for execution.
- any process discussed in this disclosure that is understood to be performable by a computer may be performed by one or more processors. Such processes include, but are not limited to, the processes shown in FIGS. 2 - 3 , and the associated language of the specification.
- the one or more processors may be configured to perform such processes by having access to instructions (computer-readable code) that, when executed by the one or more processors, cause the one or more processors to perform the processes.
- the one or more processors may be part of a computer system (e.g., one of the computer systems discussed above) that further includes a memory storing the instructions.
- the instructions also may be stored on a non-transitory computer-readable medium.
- the non-transitory computer-readable medium may be separate from any processor. Examples of non-transitory computer-readable media include solid-state memories, optical media, and magnetic media.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Computer Security & Cryptography (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims (19)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/001,457 US12169828B2 (en) | 2020-08-24 | 2020-08-24 | Systems and methods for obfuscating transactions |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/001,457 US12169828B2 (en) | 2020-08-24 | 2020-08-24 | Systems and methods for obfuscating transactions |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20220058638A1 US20220058638A1 (en) | 2022-02-24 |
| US12169828B2 true US12169828B2 (en) | 2024-12-17 |
Family
ID=80269734
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US17/001,457 Active 2042-01-02 US12169828B2 (en) | 2020-08-24 | 2020-08-24 | Systems and methods for obfuscating transactions |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US12169828B2 (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11895034B1 (en) * | 2021-01-29 | 2024-02-06 | Joinesty, Inc. | Training and implementing a machine learning model to selectively restrict access to traffic |
| US12236422B2 (en) * | 2022-01-05 | 2025-02-25 | Mastercard International Incorporated | Computer-implemented methods and systems for authentic user-merchant association and services |
Citations (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1265200A1 (en) | 2001-06-04 | 2002-12-11 | Orbis Patents Limited | Credit card system and method |
| US20080228637A1 (en) * | 2007-03-14 | 2008-09-18 | Ebay Inc. | Spending and savings secondary linked accounts |
| US20130080272A1 (en) | 2011-09-23 | 2013-03-28 | Bank Of America Corporation | Transaction device and processing system |
| US9065643B2 (en) | 2006-04-05 | 2015-06-23 | Visa U.S.A. Inc. | System and method for account identifier obfuscation |
| US20150206141A1 (en) | 2014-01-17 | 2015-07-23 | Bank Of America Corporation | Multi-layer transaction tracking |
| US20170250972A1 (en) * | 2016-02-29 | 2017-08-31 | Troy Jacob Ronda | Systems and methods for distributed identity verification |
| US20190251199A1 (en) * | 2018-02-14 | 2019-08-15 | Ivan Klianev | Transactions Across Blockchain Networks |
| US10528838B1 (en) * | 2014-09-23 | 2020-01-07 | Wells Fargo Bank, N.A. | Augmented reality confidential view |
| US20200134616A1 (en) * | 2018-06-04 | 2020-04-30 | Noah Rafalko | Telecommunication System and Method for Settling Session Transactions |
| US20210027357A1 (en) * | 2018-04-03 | 2021-01-28 | Michael Bonfigli | Systems and methods for credit card selection based on a consumer's personal spending |
| US20210192521A1 (en) * | 2018-09-13 | 2021-06-24 | Securekey Technologies Inc. | Systems and methods for distributed identity verification during a transaction |
| US20210201410A1 (en) * | 2015-03-05 | 2021-07-01 | Goldman Sachs & Co. LLC | Systems and methods for updating a distributed ledger based on partial validations of transactions |
| US11151468B1 (en) * | 2015-07-02 | 2021-10-19 | Experian Information Solutions, Inc. | Behavior analysis using distributed representations of event data |
| US20210357924A1 (en) * | 2020-05-14 | 2021-11-18 | Jpmorgan Chase Bank, N.A. | Distributed-ledger based distributed transaction processing as a brokered service |
-
2020
- 2020-08-24 US US17/001,457 patent/US12169828B2/en active Active
Patent Citations (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1265200A1 (en) | 2001-06-04 | 2002-12-11 | Orbis Patents Limited | Credit card system and method |
| US9065643B2 (en) | 2006-04-05 | 2015-06-23 | Visa U.S.A. Inc. | System and method for account identifier obfuscation |
| US20080228637A1 (en) * | 2007-03-14 | 2008-09-18 | Ebay Inc. | Spending and savings secondary linked accounts |
| US20130080272A1 (en) | 2011-09-23 | 2013-03-28 | Bank Of America Corporation | Transaction device and processing system |
| US20150206141A1 (en) | 2014-01-17 | 2015-07-23 | Bank Of America Corporation | Multi-layer transaction tracking |
| US10528838B1 (en) * | 2014-09-23 | 2020-01-07 | Wells Fargo Bank, N.A. | Augmented reality confidential view |
| US20210201410A1 (en) * | 2015-03-05 | 2021-07-01 | Goldman Sachs & Co. LLC | Systems and methods for updating a distributed ledger based on partial validations of transactions |
| US11151468B1 (en) * | 2015-07-02 | 2021-10-19 | Experian Information Solutions, Inc. | Behavior analysis using distributed representations of event data |
| US20170250972A1 (en) * | 2016-02-29 | 2017-08-31 | Troy Jacob Ronda | Systems and methods for distributed identity verification |
| US20190251199A1 (en) * | 2018-02-14 | 2019-08-15 | Ivan Klianev | Transactions Across Blockchain Networks |
| US20210027357A1 (en) * | 2018-04-03 | 2021-01-28 | Michael Bonfigli | Systems and methods for credit card selection based on a consumer's personal spending |
| US20200134616A1 (en) * | 2018-06-04 | 2020-04-30 | Noah Rafalko | Telecommunication System and Method for Settling Session Transactions |
| US20210192521A1 (en) * | 2018-09-13 | 2021-06-24 | Securekey Technologies Inc. | Systems and methods for distributed identity verification during a transaction |
| US20210357924A1 (en) * | 2020-05-14 | 2021-11-18 | Jpmorgan Chase Bank, N.A. | Distributed-ledger based distributed transaction processing as a brokered service |
Also Published As
| Publication number | Publication date |
|---|---|
| US20220058638A1 (en) | 2022-02-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11776268B2 (en) | Capturing transaction context | |
| US12198129B2 (en) | Methods and systems for multiple gating verifications based on a blockchain wallet | |
| US11657444B2 (en) | Methods and systems for generating a customized return policy | |
| US12093960B2 (en) | Mitigation of fraudulent transactions conducted over a network | |
| US12316633B2 (en) | Methods and systems for access control in a computing system | |
| US20230351369A1 (en) | Methods and systems for access control in a computing system based on verified event record | |
| US12045831B2 (en) | Secure pin entry via mobile device | |
| EP4454204B1 (en) | Methods and systems for dynamic update to access control rules in a computing system based on blockchain monitoring | |
| US8458095B2 (en) | Location-based rules for a financial account | |
| US20130060692A1 (en) | Access Control for a Financial Account | |
| US12277547B2 (en) | Methods and systems for usage-conditioned access control based on a blockchain wallet | |
| US12488332B2 (en) | E-commerce platform with tokenization system | |
| US12095804B2 (en) | Systems and methods for bot mitigation | |
| US12236472B2 (en) | Methods and systems for providing differentiated user interfaces | |
| US20240078537A1 (en) | Methods and systems for usage-conditioned access control based on a blockchain wallet | |
| WO2022221953A1 (en) | Predicting occurrences of future events using trained artificial-intelligence processes and normalized feature data | |
| US12169828B2 (en) | Systems and methods for obfuscating transactions | |
| US20250254170A1 (en) | Methods and systems for access control in a computing system | |
| US11538116B2 (en) | Life event bank ledger | |
| BR102021010334A2 (en) | WALLET SERVER, WALLET SYSTEM, AND NON-TRANSITORY STORAGE MEDIA | |
| US12406281B2 (en) | Methods and systems for serving advertisements | |
| CA3134673C (en) | Methods and systems for generating search results | |
| US11303699B1 (en) | Dynamic configuration of multi-part transfers | |
| WO2025166420A1 (en) | Data communications network and method for facilitating transactions using redeemable coupons | |
| CA3193747A1 (en) | Methods and systems for access control in a computing system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| AS | Assignment |
Owner name: CAPITAL ONE SERVICES, LLC, VIRGINIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:EDWARDS, JOSHUA;BENKREIRA, ABDELKADER;MOSSOBA, MICHAEL;REEL/FRAME:053758/0547 Effective date: 20200813 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |